𝔖 Scriptorium
✦   LIBER   ✦

📁

How to create a secure cloud architecture


Tongue
English
Leaves
5
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Sungard Availability Services, 2014. — 5 p. — (White Paper).
(Автор не указан).

Numerous trends are pushing organizations to consider the cloud model of information technology, in which computing and storage capacity are delivered as a service. Yet, many organizations hesitate to adopt cloud computing due to security concerns.
This white paper describes how adoption of cloud technology can potentially change an organization’s security requirements and how organizations can adapt their IT and security infrastructure to address these challenges. By developing a roadmap for their IT and security infrastructure, organizations are more likely to feel con

✦ Subjects


Библиотека;Компьютерная литература;Облачные вычисления и сервисы


📜 SIMILAR VOLUMES


Securing Cloud Services - A Pragmatic Ap
✍ Newcombe, Lee 📂 Library 📅 2012 🏛 IT Governance Publishing

This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud. Part 1 introduces Cloud Computing and describes the main service models (IaaS, PaaS and SaaS

Cloud Security: A Comprehensive Guide to
✍ Ronald L. Krutz, Russell Dean Vines 📂 Library 📅 2010 🏛 Wiley 🌐 English

Well-known security experts decipher the most challenging aspect of cloud computing-securityCloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-a

Mastering AWS Security: Create and maint
✍ Albert Anthony 📂 Library 📅 2017 🏛 Packt Publishing Limited 🌐 English

An informative guide to implementing and using AWS security services effectively About This Book • Learn to secure your network, infrastructure, data and applications in AWS cloud • Log, monitor and audit your AWS resources for continuous security and continuous compliance in AWS cloud • Use A

How to Cheat at Voip Security (How to Ch
✍ Thomas Porter, Michael Gough 📂 Library 📅 2007 🌐 English

The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies us

How to Cheat at Voip Security (How to Ch
✍ Thomas Porter, Michael Gough 📂 Library 📅 2007 🌐 English

The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies us

Hybrid Cloud Security Patterns: Leverage
✍ Sreekanth Iyer 📂 Library 🏛 Packt Publishing 🌐 English

<p><span>Understand unique security patterns related to identity and access management, infrastructure, data and workload protection, compliance and posture management, and zero trust for your hybrid cloud deployments</span></p><h4><span>Key Features</span></h4><ul><li><span><span>Secure cloud infra